Pass the ECCouncil EC-Council Certified Security Specialist ECSS Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

A major fire broke out in the storeroom of CyberSol Inc. It first gutted the equipment in the storeroom and then started spreading to other areas in the company. The officials of the company informed the fire department. The fire rescue team reached the premises and used a distribution piping system to suppress the fire, thereby preventing any human or asset loss.

Identify the type of fire-fighting system used by the rescue team in the above scenario.

Options:

A.

Fire extinguisher


B.

Wet chemical suppressant


C.

Standpipe system


D.

Sprinkler system


Expert Solution
Questions # 12:

Kevin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kevin decided to use an automated tool to recover the damaged, corrupted, or deleted files.

Which of the following forensic tools can help Kevin in recovering deleted files?

Options:

A.

Cain & Abel


B.

Rohos Mini Drive


C.

R-Sludio


D.

Ophcrack


Expert Solution
Questions # 13:

Bob. a security specialist at an organization, extracted the following IIS log from a Windows-based server: “2019-12-12 06:11:41 192.168.0.10 GET /images/content/bg_body_l.jpg - 80 - 192.168.0.27 Mozilla/5.0 (Windows*NT»6.3:*WOW64)*AppleWebKit/537.36*(KHTML.*like»Cecko)*Chrome/48.0.2564.103»Safari/537.36 http://www.movie5cope.com/css/style.c5s 200 0 0 365"

Identify the element in the above IIS log entry that indicates the request was fulfilled without error.

Options:

A.

192


B.

80


C.

200


D.

537


Expert Solution
Questions # 14:

Kevin, an attacker, is attempting to compromise a cloud server. In this process, Kevin intercepted the SOAP messages transmitted between a user and the server, manipulated the body of the message, and then redirected it to the server as a legitimate user to gain access and run malicious code on the cloud server.

Identify the attack initiated by Kevin on the target cloud server.

Options:

A.

Side-channel attack


B.

Wrapping attack


C.

Cross guest VM breaches


D.

DNS spoofing


Expert Solution
Questions # 15:

Clark, a security professional, was instructed to monitor and continue the backup functions without interrupting the system or application services. In this process, Clark implemented a backup mechanism that dynamically backups the data even If the system or application resources are being used.

Which of the following types of backup mechanisms has Clark implemented in the above scenario?

Options:

A.

Full backup


B.

Cold backup


C.

Hot backup


D.

Offline backup


Expert Solution
Questions # 16:

Which of th© following titles of Th© Electronic Communications Privacy Act protects the privacy of the contents of files stored by service providers and records held about the subscriber by service providers, such as subscriber name, billing records, and IP addresses?

Options:

A.

Title II


B.

Title I


C.

Title IV


D.

Title III


Expert Solution
Questions # 17:

Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.

Identify the type of IDS employed by Messy in the above scenario.

Options:

A.

Stateful protocol analysis


B.

Anomaly-based


C.

Signature-based


D.

Application proxy


Expert Solution
Questions # 18:

Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob’s system. Using this technique. Michael can extract sensitive information from unencrypted data.

Identify the class of attack Michael has launched in the above scenario.

Options:

A.

Ac live attack


B.

Insider attack


C.

Close in attack


D.

Passive attack


Expert Solution
Questions # 19:

Morris, an attacker, targeted an application server to manipulate its services. He succeeded by employing input validation attacks such as XSS that exploited vulnerabilities present in the programming logic of an application. Identify the web application layer in which Morris has manipulated the programming logic.

Options:

A.

Business layer


B.

Presentation layer


C.

Database layer


D.

Client layer


Expert Solution
Questions # 20:

Below are the various stages of the virus lifecycle:

1) Replication

2)Detection

3)lncorporation

4)Design

5)Execution of the damage routine

6)Launch

What is the correct sequence of stages involved in the virus lifecycle?

Options:

A.

3->l >2- >6 >5 >4


B.

4 >2 >3 >5 >6- >1


C.

4 >l->6 >2 >3- >5


D.

1>2 >3- >4 >5- >6


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions